Using Genetic Algorithm in Inner Product to Resist Modular Exponentiation From Higher Order DPA Attacks.
Hridoy Jyoti MahantaKeshab NathAmit Kumar RoyKetan KotechaVaradarajan VijayakumarPublished in: IEEE Access (2022)
Keyphrases
- higher order
- modular exponentiation
- differential power analysis
- countermeasures
- power analysis
- addition chains
- secure communication
- smart card
- elliptic curve
- public key cryptosystems
- information security
- key exchange
- digital signal processing
- security protocols
- public key cryptography
- markov random field
- cryptographic protocols
- security mechanisms